Sciweavers

FC
2010
Springer
177views Cryptology» more  FC 2010»
13 years 8 months ago
Signatures of Reputation
John Bethencourt, Elaine Shi, Dawn Song
FC
2010
Springer
188views Cryptology» more  FC 2010»
13 years 8 months ago
Building Incentives into Tor
Abstract. Distributed anonymous communication networks like Tor depend on volunteers to donate their resources. However, the efforts of Tor volunteers have not grown as fast as th...
Tsuen-Wan Ngan, Roger Dingledine, Dan S. Wallach
FC
2010
Springer
230views Cryptology» more  FC 2010»
13 years 8 months ago
Multiple Denominations in E-cash with Compact Transaction Data
We present a new construction of divisible e-cash that makes use of 1) a new generation method of the binary tree of keys; 2) a new way of using bounded accumulators. The transacti...
Sébastien Canard, Aline Gouget
FC
2010
Springer
160views Cryptology» more  FC 2010»
13 years 8 months ago
Measuring the Perpetrators and Funders of Typosquatting
We describe a method for identifying “typosquatting”, the intentional registration of misspellings of popular website addresses. We estimate that at least 938 000 typosquatting...
Tyler Moore, Benjamin Edelman
FC
2010
Springer
205views Cryptology» more  FC 2010»
13 years 8 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao